Still unsolved issues with INCOMING ports

The issue is that CPF silenlty blocks every app that establishes listening ports (such as most P2P apps do). Although CPF asks for approval for an app registering incoming connection, when packets come to such port, CPF silently discards the data. As a result, P2P apps can’t work effectively (for example, mule gets LowID, DC++ search stops working) unless INCOMING ports are registered system-wide in the Network Monitor rules. But it’s a very lame solution allowing every app listen specified ports.
I already reported this issue at least twice (the last one here), but haven’t got any meaning comments. So, waiting for the feedback from the devs.

Here are some more facts for DC++ issue:

C:\Documents and Settings\djet>ipconfig -all

Windows IP Configuration

    Host Name . . . . . . . . . . . . : DAINJAH
    Primary Dns Suffix  . . . . . . . :
    Node Type . . . . . . . . . . . . : Unknown
    IP Routing Enabled. . . . . . . . : Yes
    WINS Proxy Enabled. . . . . . . . : Yes

Ethernet adapter NForce:

    Connection-specific DNS Suffix  . :
    Description . . . . . . . . . . . : NVIDIA nForce Networking Controller #2
    Physical Address. . . . . . . . . : 00-04-4B-80-80-03
    Dhcp Enabled. . . . . . . . . . . : Yes
    Autoconfiguration Enabled . . . . : Yes
    IP Address. . . . . . . . . . . . : 192.168.1.2
    Subnet Mask . . . . . . . . . . . : 255.255.255.0
    Default Gateway . . . . . . . . . : 192.168.1.1
    DHCP Class ID . . . . . . . . . . :
    DHCP Server . . . . . . . . . . . : 192.168.1.1
    DNS Servers . . . . . . . . . . . : 212.188.4.10
                                        195.34.32.116
    Lease Obtained. . . . . . . . . . : 21 января 2007 г. 13:21:57
    Lease Expires . . . . . . . . . . : 21 января 2007 г. 14:21:57</blockquote>
C:\Documents and Settings\djet>netstat -anobv ...... [SKIPPED] ...... TCP 192.168.1.2:28018 0.0.0.0:0 LISTENING 2224 C:\WINDOWS\system32\WS2_32.dll S:\i-net\D0wnL0ad\StrongDC++\StrongDC.exe C:\WINDOWS\system32\RPCRT4.dll -- unknown component(s) -- [StrongDC.exe] ...... [SKIPPED] ...... UDP 0.0.0.0:[b]28019[/b] *:* 2224 C:\WINDOWS\system32\WS2_32.dll S:\i-net\D0wnL0ad\StrongDC++\StrongDC.exe -- unknown component(s) -- ntdll.dll C:\WINDOWS\system32\kernel32.dll [StrongDC.exe]
Date/Time :2007-01-21 13:22:23 Severity :Medium Reporter :Network Monitor Description: Inbound Policy Violation (Access Denied, IP = 85.75.108.83, Port = 28019) Protocol: UDP Incoming Source: 85.75.108.83:2374 Destination: 192.168.1.2:28019 Reason: Network Control Rule ID = 9

Date/Time :2007-01-21 13:22:18
Severity :Medium
Reporter :Network Monitor
Description: Inbound Policy Violation (Access Denied, IP = 85.75.108.83, Port = 28019)
Protocol: UDP Incoming
Source: 85.75.108.83:2374
Destination: 192.168.1.2:28019
Reason: Network Control Rule ID = 9

Date/Time :2007-01-21 13:22:13
Severity :Medium
Reporter :Network Monitor
Description: Inbound Policy Violation (Access Denied, IP = 85.75.108.83, Port = 28019)
Protocol: UDP Incoming
Source: 85.75.108.83:2374
Destination: 192.168.1.2:28019
Reason: Network Control Rule ID = 9

Date/Time :2007-01-21 13:22:08
Severity :Medium
Reporter :Network Monitor
Description: Inbound Policy Violation (Access Denied, IP = 85.75.108.83, Port = 28019)
Protocol: UDP Incoming
Source: 85.75.108.83:2374
Destination: 192.168.1.2:28019
Reason: Network Control Rule ID = 9

CFP has “layered” security, that’s why it’s so secure.
Just because it creates an alert popup for an app, it doesn’t mean that the app get full access to internet. It’s not a bug, it’s a feature.
For apps like filesharing and servers, you need to open a port.
Network monitor works like a router, so you need to forward port(s) for some apps.
Open a port (28019) in network monitor, and it should work.
For instructions, go to the FAQ page, or ask if you don’t know how to do it.

I seriously doubt it’s a feature. From all aspect it is rather a bug:

  1. CFP notices an application listening for a port and ask a user for approval. But even if the user permits this activity CPF won’t allow incoming traffic for the app he just allowed to. (?!)
  2. Such firewall misbehaviour may interfere with any application that dynamically opens listening ports.
  3. Opening system-wide ports in network monitor just for letting app work use them is madness from the point of security. The more restrictive rules are, the better for the system security. If a personal firewall can’t distinguish incoming specific-to-a-certain-process ports, it’s a major design flaw.

If you have just application monitor like most other firewalls, it’s just one layer…
If you also have an extra layer with network monitor, how can that be more unsafe…? Why does security experts think it’s safe, but not you?

Let’s say that you use uTorrent.
In application monitor you set up one allow all OUT rule for TCP/UDP.
And you set up one rule for TCP/UDP IN for port 50000.
Next you set up a rule in network monitor.
You set it up to allow TCP/UDP IN for port 50000 to any/your IP/your zone.

Port 50000 is NOT open all the time!
The connection HAS to start from INSIDE CFP.
When you start uTorrent, it starts to listen to port 50000, (application rule) and then network monitor opens that port for uTorrent. Only ONE app can use that port, and it’s uTorrent in this case.

Little Mac has written a text you can read here.
https://forums.comodo.com/index.php/topic,5372.0.html

I hope this helps.

What other firewalls have is interconnection between a generic L3-packet filter (Network Monitor in our case) and upper application-bound layers (Application Monitor). For example, if uTorrents creates a listening port, it is automatically open by packet filter casue the user already had confirmed this action. It makes the personal firewall more transparent both to the user and the application. This approach is better as it requires less headache from the user (consider this counting numerous topics considering P2P configuration. )and provides more secure environment where no extensively open ports exist. The third advantage is that it allows transparent work for any applications requiring listening a priori unknown to the user ports (some apps create random listening ports). Thus, I suggest some redesign of CPF core structure intended for more flexibility, transparency and security. I would appreciate if you forward this message to the developers (BTW, are there any on the forum?). Already found the support tracker, yet I wonder what I must enter into Order Number OR Domain Name field.

PS: Please, don’t touch the experts, or they’ll bite you ;D (as matousec already had done).

You can put your suggestion in the wishlist.
Comodo is monitoring that thread.

Matousec has bitten everybody, real hard. But still, Comodo received the highest score.

And there is announcement on his site that they’ve “started with testing of new versions of already tested products”. I’m sure that includes CFP 2.4 :slight_smile: